- The authors believe that providing security for supercomputer clusters is different from providing security for stand-alone PCs. The types of programs that supercomputer clusters...
Abstract--In this paper, we study moments of soft bits of binary-input symmetric-output channels and solve some extremal problems of the moments. We use these results to solve the ...
Yibo Jiang, Alexei E. Ashikhmin, Ralf Koetter, And...
We describe a compression scheme for the geometry component of 3D animation sequences. This scheme is based on the principle component analysis (PCA) method, which represents the ...
This paper describes a novel method to create a quantitative model of an educational content domain of related practice item-types using learning curves. By using a pairwise test t...
Philip I. Pavlik Jr., Hao Cen, Kenneth R. Koedinge...
We propose a prototype for a real-world, human network proximity experiment with detailed recordings of the position of individuals. Our aim is to provide a comprehensive dataset t...
Matthew Stabeler, Davide Cellai, Simon Dobson, Pad...